• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.027 seconds

Classification and Tracking of Unknown Multiple Underwater Moving Objects Using Neural Networks (신경망에 의한 미지의 다중 수중 이동물체의 판별 및 추적)

  • 하석운
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.389-396
    • /
    • 1999
  • In this paper, we propose a multiple underwater object classification and tracking algorithm using the narrowband tonal and frequency line features extracted from the frequency spectrum of the acoustic signal. The general algorithm using the wideband and narrowband energy has a high tracking error when objects are close and cross each other. But the proposed algorithm shows a good tracking performance for the simulation scenarios generated by the real acoustic data.

  • PDF

Positioning Scheme using Acceleration Factor for Wireless Sensor Networks

  • Park, Na-Yeon;Son, Cheol-Su;Lee, Sung-Jae;Hwang, In-Moon;Kim, Won-Jung
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.459-465
    • /
    • 2008
  • Locations of nodes as well as gathered data from nodes are very important because generally multiple nodes are deployed randomly and data are gathered in wireless sensor network. Since the nodes composing wireless sensor network are low cost and low performance devices, it is very difficult to add specially designed devices for positioning into the nodes. Therefore in wireless sensor network, technology positioning nodes precisely using low cost is very important and valuable. This research proposes Cooperative Positioning System, which raises accuracy of location positioning and also can find positions on multiple sensors within limited times.

A Study on Adaptive Filter Bank using Neural Networks in Time Domain (신경망을 이용한 적응 다중 대역 필터 설계)

  • 이건기;이주원;김광열;방만식;이병로;김영일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.673-677
    • /
    • 2003
  • In this study, we propose the new filter bank that is adaptive filter bank using neural networks in time domain. Also, we proposed a new filter neuron as neuron with filter window, the structure and algorithm for filter banks. The performance of neural filter banks is shown from two examples. It show characteristics the simple structure and higher speed processing than traditional methods (filter banks in frequency domain, etc.). In many applications, the proposed method will provide the high performance to features detection of signals in time domain.

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J.;Zeadally, Sherali;Jabeur, Nafaa
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.286-308
    • /
    • 2018
  • The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

Comparison of Objective Functions for Feed-forward Neural Network Classifiers Using Receiver Operating Characteristics Graph

  • Oh, Sang-Hoon;Wakuya, Hiroshi
    • International Journal of Contents
    • /
    • v.10 no.1
    • /
    • pp.23-28
    • /
    • 2014
  • When developing a classifier using various objective functions, it is important to compare the performances of the classifiers. Although there are statistical analyses of objective functions for classifiers, simulation results can provide us with direct comparison results and in this case, a comparison criterion is considerably critical. A Receiver Operating Characteristics (ROC) graph is a simulation technique for comparing classifiers and selecting a better one based on a performance. In this paper, we adopt the ROC graph to compare classifiers trained by mean-squared error, cross-entropy error, classification figure of merit, and the n-th order extension of cross-entropy error functions. After the training of feed-forward neural networks using the CEDAR database, the ROC graphs are plotted to help us identify which objective function is better.

A Heuristic Approach to Steiner Ring Problem

  • Lee, Chae-Y.;Rhee, Doug-W.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.22 no.2
    • /
    • pp.255-263
    • /
    • 1996
  • Optical fiber systems play an essential role In today's telecommunications networks. The recently standardized SONET technology has made a ring structure the preferred architecture for inter-city communication networks. In designing a SONET with ring structure, we consider inserting optional cites, which are not necessary in constructing the SONET, but cost-effective in connecting essential nodes in the ring. This problem is modeled as Steiner ring problem. Efficient heuristic procedures are developed based on the procedures for the traveling salesman problem. Computational results show that the proposed algorithm is excellent compared to the optimal solution. The error bound by the proposed method is 2 - 6% in experimented problems.

  • PDF

Cooperative Incumbent System Protection MAC Protocol for Multi-channel Ad-hoc Cognitive Radio Networks

  • Yi, Ke;Hao, Nan;Yoo, Sang-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1976-1996
    • /
    • 2011
  • Cognitive radio (CR) MAC protocol provides access control of unused spectrum resources without causing interference to primary users. To achieve this goal, in this paper a TDMA based cooperative multi-channel cognitive radio MAC (MCR-MAC) protocol is proposed for wireless ad hoc networks to provide reliable protection for primary users by achieving cooperative detection of incumbent system signals around the communication pair. Each CR node maintains transmission opportunity schedules and a list of available channels that is employed in the neighbor discovery period. To avoid possible signal collision between incumbent systems and cognitive radio ad hoc users, we propose a simple but efficient emergency notification message exchanging mechanism between neighbor CR nodes with little overhead. Our simulation results show that the proposed MCR-MAC can greatly reduce interference with primary users and remarkably improve the network throughput.

Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption

  • Babamir, Faezeh Sadat;Eslami, Ziba
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2940-2955
    • /
    • 2012
  • In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The main challenge of these networks established in sensitive environments is offline sink visiting. Moreover, the sensors must retain collected data for long enough time to offload them onto the itinerant sink. Thus, the unattended nature of data collection intervals might offer the adversary the opportunity to apply various attacks without detection. In this paper, employing low order operations (in time and space), we propose a new secure scheme in which various security goals such as confidentiality (through encrypting), authentication and integrity (through signing) are achieved. In addition, the aggregation process of our scheme reduces the space and communication overheads both for sensors and sink, i.e. the proposed technique efficiently enables the sensors and sink to protect, verify and recover all the related data. We further compare our scheme with the best alternative work in the literature.

Design of Survivable Communication Networks with High-connectivity Constraints

  • Koh, Seok J.;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.3
    • /
    • pp.59-80
    • /
    • 1997
  • Designing highly survivable interoffice telecommunication networks is considered. The problem is formulated as a minimum-cost network design problem with three node connectivity constraints. These valid and facet-defining inequalities for the convex hull of the solution are presented. A branch and cut algorithm is proposed based on the inequalities to obtain the optimal solution. With the lower bound by the cutting plane algorithm, a delete-ink heuristic is proposed to otain a good upper bound in the branch and bound procedure. The effeciveness of the branch and cut algorithm is demonstrated with computational results for a variety of problem sets : different lower bounds, two types of link costs and large number of links. The cutting plane procedure based on the three inequalities provides excellent lower bounds to the optimal solutions.

  • PDF

Network Analysis of East Asian Research in South Korea for the 2004-2013 Period

  • Park, Ji-Young;Park, Han Woo
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.52-61
    • /
    • 2015
  • In the past decade, East Asian Research has received attention from researchers as well as in South Korea society-at-large. The broad category of East Asian Research includes various disciplinary fields, such as "history, economics, and politics; however, few studies have used quantitative analysis to explore its development. In this paper, we used network analysis to identify the disciplines and active research areas, focusing on productivity, collaboration patterns, and citation networks of East Asian Research in South Korea. For this study, 6,646 journal publications related with East Asian Research and indexed by KCI (Korean Citation Index) during the 10-year period of 2004-2013 were considered. Results show that East Asian Research was led during this period by sole-researchers, rather than interdisciplinary studies. Moreover, a co-institution network represents active institutions with a high degree and collaborative centrality. In terms of journal-journal citation networks, journals belonging to both "history" and "Korean literature" disciplines were dominant.